累计通过IE学员人数:自2011年起累计1700人 当年422人 当月22人
咨询热线:0571-86959638咨询QQ:839898248,VX:swiers2011
rx online
 

(1.8~1.10)
1.8 配置后的结果
通过Router#show ip ipsec sa 以及show ip isakmp sa 来查看当前建立 VPN隧道后数据流穿越的情况。
1.1.1在PIX中的结果
pixfirewall# show crypto isakmp sa
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1   IKE Peer: 34.34.34.3
Type    : L2L             Role    : responder
Rekey   : no              State   : MM_ACTIVE

2.pixfirewall# show ipsec sa
interface: outside
Crypto map tag: cisco, seq num: 10, local addr: 35.35.35.3
access-list nat0 permit ip 172.16.10.0 255.255.255.0 172.16.11.0 255.255.255.0
local ident (addr/mask/prot/port): (172.16.10.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (172.16.11.0/255.255.255.0/0/0)
current_peer: 34.34.34.3
#pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4
#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 4, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
local crypto endpt.: 35.35.35.3, remote crypto endpt.: 34.34.34.3
path mtu 1500, ipsec overhead 58, media mtu 1500
current outbound spi: 44D064A6
inbound esp sas:
spi: 0x9296DA19 (2459359769)
transform: esp-3des esp-md5-hmac none
in use settings ={L2L, Tunnel, }
slot: 0, conn_id: 4096, crypto-map: cisco
sa timing: remaining key lifetime (kB/sec): (4274999/3582)
IV size: 8 bytes
replay detection support: Y
outbound esp sas:
spi: 0x44D064A6 (1154507942)
transform: esp-3des esp-md5-hmac none
in use settings ={L2L, Tunnel, }
slot: 0, conn_id: 4096, crypto-map: cisco
sa timing: remaining key lifetime (kB/sec): (4274999/3582)
IV size: 8 bytes
replay detection support: Y
1.1.2在北京Gateway路由器上的结果
1.BJ#show cry isakmp sa
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id slot status
35.35.35.3      34.34.34.3      QM_IDLE           1001    0 ACTIVE
IPv6 Crypto ISAKMP SA

2.BJ#show cry ipsec sa
interface: FastEthernet0/0
Crypto map tag: cisco, local addr 34.34.34.3
protected vrf: (none)
local  ident (addr/mask/prot/port): (172.16.11.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (172.16.10.0/255.255.255.0/0/0)
current_peer 35.35.35.3 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 14, #pkts encrypt: 14, #pkts digest: 14
#pkts decaps: 14, #pkts decrypt: 14, #pkts verify: 14
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 1, #recv errors 0
local crypto endpt.: 34.34.34.3, remote crypto endpt.: 35.35.35.3
path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0
current outbound spi: 0x9296DA19(2459359769)
inbound esp sas:
spi: 0x44D064A6(1154507942)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
conn id: 1, flow_id: 1, crypto map: cisco
sa timing: remaining key lifetime (k/sec): (4408434/2389)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x9296DA19(2459359769)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
conn id: 2, flow_id: 2, crypto map: cisco
sa timing: remaining key lifetime (k/sec): (4408434/2388)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
outbound pcp sas:

1.2测试太原总公司和北京分公司的连通性
1.2.1北京分公司到总公司的流量
BJ#ping 172.16.10.1 source 172.16.11.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.10.1, timeout is 2 seconds:
Packet sent with a source address of 172.16.11.1
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/59/88 ms

1.2.2太原总公司到北京分公司的流量
inside#ping 172.16.11.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.11.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 8/56/104 ms

(完结)
 

Copyright © 2011-2023 思唯网络课堂 Swiers All Rights Reserved. | 浙ICP备17056685号